Feeds

Lookout for major Outlook bug

MS advises browser update

  • alert
  • submit to reddit

Intelligent flash storage arrays

Microsoft has warned of a potentially devastating security vulnerability involving its popular Outlook and Outlook Express email clients. It could allow attackers to trick users into running malicious code so giving them control of a victim's machine.

The security bug concerns the vCard, or virtual business cards, component of Outlook, which has been found by @Stake, a firm of security researchers and consultants, to contain a buffer overflow vulnerability.

By creating a vCard doctored with malicious code an attacker could either cause a mail client to crash, or far more seriously, could cause the mail client to run arbitrary hostile code on a victim's machine.

In a security notice on the problem, Microsoft admitted: "Such code could take any desired action, limited only by the permissions of the recipient on the machine.

"It could take any action the user himself could take, including adding, changing or deleting data, communicating with web sites, reformatting the disk drive, and other actions."

vCards arrive at a users machine as email attachments and Microsoft has said the vulnerability is mitigated by the fact a user would have to open an affected attachment or drag it into his contacts book to be affected. However the problem is still serious enough for Microsoft to recommend that all Outlook users should consider updating their browser with a patch.

The affected component is part of Outlook Express, which ships as part of Internet Explorer, so a browser upgrade, not just a patch for the mail client, is needed in order to plug the security hole. Because Outlook uses the same affected component it is also affected by the problem. ®

External links

Microsft's security advisory

Related Stories

MS protects Mac but not Windows users with web bug mail firewall
Warning: Outlook Express can damage your postcards
JavaScript makes e-mail bugging easy

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.